IT Management  >   Systems Operations  >   Systems Management  >  

Device Management

RSS Feed   
Device Management Reports
 
MSPs Transform Their Endpoint Security
sponsored by Malwarebytes
CASE STUDY: In this collection of case studies, follow the journeys of three organizations (Optimus System, Sentrian, and Edge Computers) as they partner with Malwarebytes to navigate endpoint security challenges related to malware infections, downtime, ransomware, and more. Read on to get started.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Malwarebytes

Connecting Remote Employees with Zoom Phone
sponsored by Zoom Video Communications
WEBCAST: As enterprises move to the cloud, there is a large push to consolidate communications services to make them more manageable and connected. This is multiplied by the fact that workforces are becoming increasingly mobile and need to be able to chat from anywhere. Watch this webcast to learn about how Zoom Phone addresses these challenges.
Posted: 08 Oct 2020 | Premiered: May 21, 2020

Zoom Video Communications

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

How to Secure Your Remote Workforce Effectively
sponsored by BlackBerry
EBOOK: Remote working capabilities enable organizations to support a global workforce – and if done effectively it can yield benefits related to efficiency, flexibility and cost-effectiveness without sacrificing security. Read this eBook to learn how to secure remote workforces.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

BlackBerry

5 Must-Haves to Look for in a Best-in-Class IoT Security Solution
sponsored by Palo Alto Networks
WHITE PAPER: Based on Gartner’s predictions, adoption of IoT endpoint is estimated to reach 5.81 billion this year. However, in order to integrate IoT responsibly, security considerations need to be made. In this buyer’s guide, discover what to look for in an IoT security solution.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

Securing Your Remote Workforce with Okta and Palo Alto Networks
sponsored by Palo Alto Networks
WEBCAST: We are in the new normal – organizations are having to deal with more cyberthreats than ever before, and security is changing as a result. Join industry experts in this webinar as they discuss the specific security challenges facing organizations with distributed or remote workforces and how they can address them with a zero-trust model.
Posted: 04 Jan 2021 | Premiered: Jan 4, 2021

Palo Alto Networks

Empowering Worker Mobility with IGEL
sponsored by IGEL Technology GmbH
WHITE PAPER: With an increasingly remote workforce comes new challenges. Learn how to solve key endpoint deployment, management, and other remote work challenges with a powerful, centralized endpoint management platform.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

IGEL Technology GmbH

Webinar: Managing the Cybersecurity Risk of Your Growing Remote Workforce
sponsored by Automox
WEBCAST: Due to recent events, the workforce has completely shifted, and organizations are forced to adopt remote work policies. In this webinar, join two Automox security experts as they offer insight into seamlessly transitioning your security posture (including endpoints and mobile devices) to reflect the changes in your workforce.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020


Cybereason Mobile
sponsored by Cybereason
DATA SHEET: Mobile devices are now more popular for enterprise use and workplace productivity than desktops or laptops. With millions of malware threats for a growing variety of devices and OS’s alongside cloud and mobile-first apps, the risks are complex and expanding. Don’t get left behind, view this data sheet to learn how to keep mobile devices secure.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Cybereason
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info